Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

GhostCall and GhostHire — two campaigns by BlueNoroff

0
Medium
Vulnerability
Published: Tue Oct 28 2025 (10/28/2025, 15:19:04 UTC)
Source: Kaspersky Security Blog

Description

GhostCall and GhostHire, two campaigns by the BlueNoroff APT group (a subgroup of Lazarus), target developers and executives in the crypto industry.

AI-Powered Analysis

AILast updated: 10/28/2025, 15:25:26 UTC

Technical Analysis

The BlueNoroff APT group, a Lazarus subgroup, has launched two coordinated campaigns named GhostCall and GhostHire targeting the cryptocurrency industry. GhostCall primarily targets executives using sophisticated social engineering, impersonating investors with stolen identities and even fragments of real video calls to establish trust. Victims are directed to fake Microsoft Teams or Zoom websites that prompt them to download malware disguised as client updates or fixes. The campaign mainly targets macOS platforms, reflecting the popularity of Apple devices among executives. GhostHire targets blockchain developers by offering fake job opportunities. Attackers use Telegram bots to provide test tasks hosted on GitHub or as downloadable archives. These tasks have tight deadlines to pressure victims into executing malware-laden files quickly. Both campaigns share a common command and control infrastructure and aim to steal cryptocurrency, credentials, and sensitive corporate information. The malware infection chains are complex, with at least seven identified in GhostCall alone, including previously unseen variants. No public exploits are known, indicating these are targeted, manual attacks rather than automated mass exploits. The campaigns demonstrate advanced social engineering combined with custom malware delivery tailored to the crypto sector's unique environment. Protection relies heavily on user awareness and endpoint security, as attackers exploit trust and urgency rather than software vulnerabilities. The campaigns highlight the evolving tactics of financially motivated APT groups focusing on high-value targets in emerging technology sectors.

Potential Impact

For European organizations, especially those involved in cryptocurrency, blockchain development, or fintech, these campaigns pose significant risks. Successful infections can lead to theft of cryptocurrency assets, compromise of sensitive credentials, and exposure of proprietary blockchain development secrets, potentially resulting in financial losses and reputational damage. Executives infected via GhostCall may inadvertently provide attackers with access to corporate networks or strategic plans, while developers compromised through GhostHire risk intellectual property theft and insertion of backdoors into blockchain projects. The focus on macOS devices among executives is notable, as Apple hardware is prevalent in European corporate environments. The targeted nature means that organizations with high-profile crypto operations or blockchain development teams are at elevated risk. Additionally, the use of social engineering and fake recruitment processes can undermine trust in legitimate hiring and investor communications. The campaigns could disrupt business continuity if malware includes data exfiltration or destructive components. Overall, the threat could impact confidentiality, integrity, and availability of critical assets in the European crypto sector.

Mitigation Recommendations

European organizations should implement tailored security awareness training focusing on the specific social engineering tactics used in GhostCall and GhostHire, emphasizing skepticism towards unsolicited investment meetings and job offers, especially those involving urgent download requests or unfamiliar communication channels like Telegram bots. Training should be role-specific, targeting executives and developers with simulated phishing and social engineering exercises. Deploy advanced endpoint protection solutions capable of detecting and blocking malware on macOS and other platforms, including behavioral analysis to identify suspicious downloads and execution. Enforce strict policies on software updates, ensuring updates are only applied through official channels. Monitor network traffic for connections to known command and control infrastructure associated with BlueNoroff. Implement multi-factor authentication and credential monitoring to detect potential compromise early. Establish clear procedures for verifying recruitment communications and investor meetings, including out-of-band verification of identities. Regularly audit and restrict permissions on developer systems to limit malware impact. Use threat intelligence feeds to stay updated on indicators of compromise related to these campaigns. Finally, encourage reporting of suspicious communications to security teams promptly to enable rapid incident response.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/bluenoroff-ghostcall-ghosthire-lazarus/54681/","fetched":true,"fetchedAt":"2025-10-28T15:25:11.468Z","wordCount":996}

Threat ID: 6900e057d44cb7cb5001080e

Added to database: 10/28/2025, 3:25:11 PM

Last enriched: 10/28/2025, 3:25:26 PM

Last updated: 10/30/2025, 10:46:07 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats